-
2
-
-
33744529805
-
-
Technical Report, 37 pages, April
-
D. J. Bernstein. Cache-timing attacks on AES. Technical Report, 37 pages, April 2005. Available at: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
-
(2005)
Cache-timing Attacks on AES
-
-
Bernstein, D.J.1
-
3
-
-
85032541897
-
Remote timing attacks are practical
-
August 04-08, Washington, DC
-
David Brumley, Dan Boneh, Remote timing attacks are practical, Proceedings of the 12th conference on USENIX Security Symposium, p.1-1, August 04-08, 2003, Washington, DC
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 1-1
-
-
Brumley, D.1
Boneh, D.2
-
4
-
-
33745803485
-
High assurance computing on open hardware architectures
-
17 pages, Microsoft Corporation, March
-
Y. Chen, P. England, M. Peinado, and B. Willman. High Assurance Computing on Open Hardware Architectures. Technical Report, MSR-TR-2003-20, 17 pages, Microsoft Corporation, March 2003. Available at: ftp://ftp.research.microsoft. com/pub/tr/tr-2003-20.ps
-
(2003)
Technical Report, MSR-TR-2003-20
-
-
Chen, Y.1
England, P.2
Peinado, M.3
Willman, B.4
-
5
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
June. [doi: 10.1109/TC.2004.13]
-
Benoît Chevallier-Mames, Mathieu Ciet, Marc Joye, Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity, IEEE Transactions on Computers, v.53 n.6, p.760-768, June 2004 [doi: 10.1109/TC.2004.13]
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevallier-Mames, B.1
Ciet, M.2
Joye, M.3
-
6
-
-
24044554454
-
Statistics and secret leakage
-
August. [doi: 10.1145/1015047.1015050]
-
Jean-Sebastien Coron, David Naccache, Paul Kocher, Statistics and secret leakage, ACM Transactions on Embedded Computing Systems (TECS), v.3 n.3, p.492-508, August 2004 [doi: 10.1145/1015047.1015050]
-
(2004)
ACM Transactions on Embedded Computing Systems (TECS)
, vol.3
, Issue.3
, pp. 492-508
-
-
Coron, J.-S.1
Naccache, D.2
Kocher, P.3
-
7
-
-
0038110492
-
A practical implementation of the timing attack
-
September 14-16
-
Jean-François Dhem, François Koeune, Philippe-Alexandre Leroux, Patrick Mestré, Jean-Jacques Quisquater, Jean-Louis Willems, A Practical Implementation of the Timing Attack, Proceedings of the The International Conference on Smart Card Research and Applications, p.167-182, September 14-16, 1998
-
(1998)
Proceedings of the the International Conference on Smart Card Research and Applications
, pp. 167-182
-
-
Dhem, J.-F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
8
-
-
0042349623
-
A trusted open platform
-
July. [doi: 10.1109/MC.2003.1212691]
-
Paul England, Butler Lampson, John Manferdelli, Marcus Peinado, Bryan Willman, A Trusted Open Platform, Computer, v.36 n.7, p.55-62, July 2003 [doi: 10.1109/MC.2003.1212691]
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
9
-
-
2342591856
-
The intel pentium M processor: Microarchitecture and performance
-
May
-
S. Gochman, R. Ronen, I. Anati, A. Berkovits, T. Kurts, A. Naveh, A. Saeed, Z. Sperber, and R. Valentine. The Intel Pentium M processor: Microarchitecture and performance. Intel Technology Journal, volume 7, issue 2, May 2003.
-
(2003)
Intel Technology Journal
, vol.7
, Issue.2
-
-
Gochman, S.1
Ronen, R.2
Anati, I.3
Berkovits, A.4
Kurts, T.5
Naveh, A.6
Saeed, A.7
Sperber, Z.8
Valentine, R.9
-
11
-
-
0035427012
-
Lattice attacks on digital signature schemes, designs
-
August. [doi: 10.1023/A:1011214926272]
-
N. A. Howgrave-Graham, N. P. Smart, Lattice Attacks on Digital Signature Schemes, Designs, Codes and Cryptography, v.23 n.3, p.283-290, August 2001 [doi: 10.1023/A:1011214926272]
-
(2001)
Codes and Cryptography
, vol.23
, Issue.3
, pp. 283-290
-
-
Howgrave-Graham, N.A.1
Smart, N.P.2
-
12
-
-
0003666511
-
-
Academic Press, Inc., Orlando, FL
-
Jim Handy, The cache memory book (2nd ed.): the authoritative reference on cache design, Academic Press, Inc., Orlando, FL, 1998
-
(1998)
The Cache Memory Book (2nd Ed.): The Authoritative Reference on Cache Design
-
-
Handy, J.1
-
13
-
-
0003278283
-
The microarchitecture of the pentium 4 processor
-
Feb.
-
G. Hinton, D. Sager, M. Upton, D. Boggs, D. Carmean, A. Kyker, and P. Roussel. The Microarchitecture of the Pentium 4 Processor. Intel Technology Journal, volume 5, issue 1, Feb. 2001.
-
(2001)
Intel Technology Journal
, vol.5
, Issue.1
-
-
Hinton, G.1
Sager, D.2
Upton, M.3
Boggs, D.4
Carmean, D.5
Kyker, A.6
Roussel, P.7
-
15
-
-
84889908237
-
A protected division algorithm
-
November 21-22, San Jose, CA
-
Marc Joye, Karine Villegas, A protected division algorithm, Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference, p.8-8, November 21-22, 2002, San Jose, CA
-
(2002)
Proceedings of the 5th Conference on Smart Card Research and Advanced Application Conference
, pp. 8-8
-
-
Joye, M.1
Villegas, K.2
-
17
-
-
84876319896
-
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
-
H. Kahl. SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation. Cryptology ePrint Archive, Report 2004/197, 2004, http://eprint.iacr.org/197.pdf.
-
(2004)
Cryptology EPrint Archive, Report 2004/197
-
-
Kahl, H.1
-
18
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
August 18-22
-
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, p.104-113, August 18-22, 1996
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.C.1
-
20
-
-
84944878354
-
-
CRC Press, Inc., Boca Raton, FL
-
Alfred J. Menezes, Scott A. Vanstone, Paul C. Van Oorschot, Handbook of Applied Cryptography, CRC Press, Inc., Boca Raton, FL, 1996
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Van Oorschot, P.C.3
-
21
-
-
1842765540
-
Microbenchmarks for determining branch predictor organization
-
April. [doi: 10.1002/spe.v34:5]
-
Milena Milenkovic, Aleksandar Milenkovic, Jeffrey Kulick, Microbenchmarks for determining branch predictor organization, Software-Practice & Experience, v.34 n.5, p.465-487, April 2004 [doi: 10.1002/spe.v34:5]
-
(2004)
Software-Practice & Experience
, vol.34
, Issue.5
, pp. 465-487
-
-
Milenkovic, M.1
Milenkovic, A.2
Kulick, J.3
-
22
-
-
74349098914
-
Advances on access-driven cache attacks on AES
-
Montreal, Canada, August, to appear at Springer LNCS
-
M. Neve and J.-P. Seifert. Advances on Access-driven Cache Attacks on AES. Proceedings of Selected Area of Cryptology (SAC 2006), Montreal, Canada, August 2006, to appear at Springer LNCS.
-
(2006)
Proceedings of Selected Area of Cryptology (SAC 2006)
-
-
Neve, M.1
Seifert, J.-P.2
-
23
-
-
33746391879
-
The insecurity of the digital signature algorithm with partially known nonces
-
Springer
-
P. Q. Nguyen and I. E. Shparlinski. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Journal of Cryptology, vol. 15, no. 3, pp. 151176, Springer, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 151176
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
24
-
-
0141889703
-
The insecurity of the elliptic curve digital signature algorithm with partially known nonces, designs
-
September. [doi: 10.1023/A:1025436905711]
-
Phong Q. Nguyen, Igor E. Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces, Designs, Codes and Cryptography, v.30 n.2, p.201-217, September 2003 [doi: 10.1023/A: 1025436905711]
-
(2003)
Codes and Cryptography
, vol.30
, Issue.2
, pp. 201-217
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
27
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
D. Pointcheval, editor, Springer-Verlag, LNCS
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, D. Pointcheval, editor, pages 1-20, Springer-Verlag, LNCS vol. 3860, 2006.
-
(2006)
Topics in Cryptology - CT-RSA 2006, the Cryptographers' Track at the RSA Conference 2006
, vol.3860
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
28
-
-
0004302191
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA
-
David A. Patterson, John L. Hennessy, Computer architecture: a quantitative approach, Morgan Kaufmann Publishers Inc., San Francisco, CA, 1990
-
(1990)
Computer Architecture: A Quantitative Approach
-
-
Patterson, D.A.1
Hennessy, J.L.2
-
32
-
-
0030380559
-
Trace cache: A low latency approach to high bandwidth instruction fetching
-
December 02-04, Paris, France
-
Eric Rotenberg, Steve Bennett, James E. Smith, Trace cache: a low latency approach to high bandwidth instruction fetching, Proceedings of the 29th annual ACM/IEEE international symposium on Microarchitecture, p.24-35, December 02-04, 1996, Paris, France
-
(1996)
Proceedings of the 29th Annual ACM/IEEE International Symposium on Microarchitecture
, pp. 24-35
-
-
Rotenberg, E.1
Bennett, S.2
Smith, J.E.3
-
37
-
-
0029210672
-
The intel 80×86 processor architecture: Pitfalls for secure systems
-
May 08-10
-
O. Sibert, P. A. Porras, R. Lindell, The Intel 80×86 Processor Architecture: Pitfalls for Secure Systems, Proceedings of the 1995 IEEE Symposium on Security and Privacy, p.211, May 08-10, 1995
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 211
-
-
Sibert, O.1
Porras, P.A.2
Lindell, R.3
-
38
-
-
84891415333
-
-
Springer-Verlag New York, Inc., Secaucus, NJ
-
Sean W. Smith, Trusted Computing Platforms: Design and Applications, Springer-Verlag New York, Inc., Secaucus, NJ, 1899
-
(1899)
Trusted Computing Platforms: Design and Applications
-
-
Smith, S.W.1
-
39
-
-
84876300422
-
-
Trusted Computing Group, http://www.trustedcomputinggroup.org.
-
-
-
-
40
-
-
20344391930
-
Intel virtualization technology
-
May. [doi: 10.1109/MC.2005.163]
-
Rich Uhlig, Gil Neiger, Dion Rodgers, Amy L. Santoni, Fernando C. M. Martins, Andrew V. Anderson, Steven M. Bennett, Alain Kagi, Felix H. Leung, Larry Smith, Intel Virtualization Technology, Computer, v.38 n.5, p.48-56, May 2005 [doi: 10.1109/MC.2005.163]
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
41
-
-
0033204468
-
Montgomery exponentiation needs no final subtractions
-
October
-
C. D. Walter. Montgomery Exponentiation Needs No Final Subtractions. IEE Electronics Letters, volume 35, number 21, pages 1831-1832, October 1999.
-
(1999)
IEE Electronics Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
|